Consider filtered views
Both namespaces and ACL policies can filter Nomad objects from an operator access. This can occasionally lead to confusion when a job with the same name is running in multiple namespaces. ACLs will filter the views down to abjects that are accessible via the provided token (or the anonymous policy).
Secure the UI
Depending on the size of your team and the details of your Nomad deployment, you may wish to control which features different internal users have access to. You can enforce this with Nomad's access control list system.
By default, all features—read and write—are available to all users of the Web UI. Check out the Securing the Web UI with ACLs guide to learn how to prevent anonymous users from having write permissions as well as how to continue to use Web UI write features as a privileged user.
Don't forget "as-code"
Although the Web UI lets users submit jobs in an ad-hoc manner, Nomad was deliberately designed to declare jobs using a configuration language. It is recommended to treat your job definitions, like the rest of your infrastructure, as code.
By checking in your job definition files as source control, you will always have a log of changes to assist in debugging issues, rolling back versions, and collaborating on changes using development best practices like code review.